Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Shadow APIs: The Blind Spot Putting Your Security at Risk #ShadowAPIs #APIDiscovery #devsecops

Shadow APIs those undocumented, forgotten, or hidden endpoints are one of today’s biggest cybersecurity risks. If you don’t know what APIs you have, you can’t protect them. Wallarm and Oracle experts explain why a complete and up-to-date API inventory is the foundation of modern security, and how missing even a single API can open the door for attackers.

Episode 24: Guardians of access: PAM, AI, and the future of cybersecurity ft. Ramanathan K

In this episode of Server Room, we dive into the fast-evolving world of Privileged Access Management (PAM) with Ramanathan K, Head of the PAM Suite at ManageEngine. From humble beginnings as a password vault to becoming a core pillar of identity security, PAM has come a long way. We unpack the growing role of AI, the rise of non-human identities, zero standing privileges, and how real-world breaches are being tackled—especially in regions like the Middle East and Africa. Whether you're a security professional or just PAM-curious, this episode is packed with insights you won’t want to miss.

CrowdStrike Signal: Detect the Undetectable

Modern adversaries hide in plain sight by blending malicious activity with normal system behavior, making it difficult for traditional detection tools to identify threats early. CrowdStrike Signal uses self-learning AI to turn scattered signals into high-confidence Automated Leads that help analysts stop breaches before they escalate.

How Arrivia Stopped an Insider Data Theft Ring with Teramind [Case Study]

When Justin Skagen, VP of Revenue Integrity and Operational Compliance at Arrivia, discovered an employee building secret databases of customer information in the middle of the night, he knew traditional security measures weren't enough. What started as another department's productivity experiment became Arrivia's most powerful fraud detection weapon, catching everything from data exfiltration attempts to time clock manipulation across their global call centers.